Back to Results
First PageMeta Content
Off-the-Record Messaging / Man-in-the-middle attack / Diffie–Hellman key exchange / Public-key cryptography / Public key fingerprint / Alice and Bob / Blinding / RSA / Extensible Messaging and Presence Protocol / Cryptography / Cryptographic protocols / Socialist millionaire


Improved User Authentication in Off-The-Record Messaging Chris Alexander
Add to Reading List

Document Date: 2007-08-16 13:09:03


Open Document

File Size: 155,29 KB

Share Result on Facebook

City

Alexandria / /

Company

Diffie-Hellman Group / AES / vA sA / ACM Press / AOL / Ziff Davis Publishing Holdings Inc. / /

Country

Canada / United States / /

Currency

USD / /

/

Event

Person Communication and Meetings / /

Facility

Computer Science University of Waterloo Waterloo / /

IndustryTerm

machinery / above protocol / instant messaging software / privacy software / privacy-enhancing software / computing / secure software / Internet using IM / basic tools / online instructions / modulus / online guess / online execution / Internet Key Exchange / security software / /

Movie

Man in the Middle / /

OperatingSystem

Linux / /

Organization

Messaging Chris Alexander Ian Goldberg David R. Cheriton School / Electronic Society / Natural Sciences and Engineering Research Council of Canada / Computer Science University of Waterloo Waterloo / /

Person

Jacques Traoré / Torben Pryds Pedersen / Unless Alice / Andrew Yao / Steven J. Murdoch / Mario Di Raimondo / Mika Kojo / Zq / Berry Schoenmakers / Bob Bob / Fabrice Boudot / Rosario Gennaro / Martin E. Hellman / Michael J. Wiener / Alma Whitten / Eve / David Chaum / Ian Goldberg / Hugo Krawczyk / Whitfield Diffie / Paul C. van Oorschot / Moti Yung / Tero Kivinen / Alice / Nikita Borisov / J. D. Tygar / Markus Jakobsson / Claus-Peter Schnorr / Alice Bob / Olivier Goffart / Sean Egan / /

Position

Private / /

ProvinceOrState

Virginia / Pennsylvania / /

PublishedMedium

IEEE Transactions on Information Theory / Journal of Cryptology / Lecture Notes in Computer Science / /

Technology

OTR protocol / 3 GHz processor / modified protocol / above protocol / Linux / Instant Messaging / secret key / encryption / cryptography / IM protocols / compressed protocol / Jabber protocol / Data Encryption / unmodified protocol / private key / IKE Protocols / public key / video conferencing / Off-the-Record Messaging protocol / stream cipher / Network Protocols / /

URL

http /

SocialTag